%A David P. Reed %T Implementing atomic actions on decentralized data %J ACM Transactions on Computer Systems %K tocs %V 1 %N 1 %D February 1983 %P 3-23 %A Douglas W. Clark %T Cache performance in the VAX-11/780 %J ACM Transactions on Computer Systems %K tocs %V 1 %N 1 %D February 1983 %P 24-37 %A Adi Shamir %T On the generation of cryptographically strong pseudorandom sequences %J ACM Transactions on Computer Systems %K tocs %V 1 %N 1 %D February 1983 %P 38-44 %A George W. Cox %A William M. Corwin %A Konrad K. Lai %A Fred J. Pollack %T Interprocess communication and processor dispatching on the Intel 432 %J ACM Transactions on Computer Systems %K tocs %V 1 %N 1 %D February 1983 %P 45-66 %A Charles H. Sauer %T Computational algorithms for state-dependent queueing networks %J ACM Transactions on Computer Systems %K tocs %V 1 %N 1 %D February 1983 %P 67-92 %A Derek L. Eager %A Kenneth C. Sevcik %T Performance bound hierarchies for queueing networks %J ACM Transactions on Computer Systems %K tocs %V 1 %N 2 %D May 1983 %P 99-115 %A Subhash C. Agrawal %A Jeffrey P. Buzen %T The aggregate server method for analyzing serialization delays in computer systems %J ACM Transactions on Computer Systems %K tocs %V 1 %N 2 %D May 1983 %P 116-143 %A K. Many Chandy %A Jayadev Misra %A Laura M. Haas %T Distributed deadlock detection %J ACM Transactions on Computer Systems %K tocs %V 1 %N 2 %D May 1983 %P 144-156 %A Peter R. Cappello %A Kenneth Steiglitz %T A VLSI layout for a pipelined Dadda multiplier %J ACM Transactions on Computer Systems %K tocs %V 1 %N 2 %D May 1983 %P 157-174 %A Manuel Blum %T How to exchange (secret) keys %J ACM Transactions on Computer Systems %K tocs %V 1 %N 2 %D May 1983 %P 175-193 %A Tsumotu Hoshino %A Toshio Kawai %A Tomonori Shirakawa %A Junichi Higashino %A Akira Yamaoka %A Hachidai Ito %A Takashi Sato %A Kazuo Sawada %T PACS: a parallel microprocessor array for scientific calculations %J ACM Transactions on Computer Systems %K tocs %V 1 %N 3 %D August 1983 %P 195-221 %A Richard D. Schlichting %A Fred B. Schneider %T Fail-stop processors: an approach to designing fault-tolerant computing systems %J ACM Transactions on Computer Systems %K tocs %V 1 %N 3 %D August 1983 %P 222-238 %A Selim G. Akl %A Peter D. Taylor %T Cryptographic solution to a problem of access control in a hierarchy %J ACM Transactions on Computer Systems %K tocs %V 1 %N 3 %D August 1983 %P 239-248 %A R.K. Bauer %A T.A. Berson %A R.J. Feiertag %T A key distributed protocol using event markers %J ACM Transactions on Computer Systems %K tocs %V 1 %N 3 %D August 1983 %P 249-255 %A Richard A. Kemmerer %T Shared resource matrix methodology: an approach to identifying storage and timing channels %J ACM Transactions on Computer Systems %K tocs %V 1 %N 3 %D August 1983 %P 256-277 %A William D. Strecker %T Transient behaviour of cache memories %J ACM Transactions on Computer Systems %K tocs %V 1 %N 4 %D November 1983 %P 281-293 %A Hiroshi Kobayashi %A Mario Gerla %T Optimal routing networks %J ACM Transactions on Computer Systems %K tocs %V 1 %N 4 %D November 1983 %P 294-310 %A Lansing Sloan %T Mechanisms that enforce bounds on packet lifetimes %J ACM Transactions on Computer Systems %K tocs %V 1 %N 4 %D November 1983 %P 311-330 %A A. Udaya Shankar %A Simon S. Lam %T An HDLC protocol specification and its verification using image protocols %J ACM Transactions on Computer Systems %K tocs %V 1 %N 4 %D November 1983 %P 331-368 %A Michael D. Schroder %A Andrew D. Birrell %A Roger M. Needham %T Experience with Grapevine: the growth of a distributed system %J ACM Transactions on Computer Systems %K tocs %V 2 %N 1 %D February 1984 %P 3-23 %A Bruce G. Lindsay %A Laure M. Haas %A C. Mohan %A Paul F. Wilms %A Robert A. Yost %T Computation and communication in R*: a distributed database manager %J ACM Transactions on Computer Systems %K tocs %V 2 %N 1 %D February 1984 %P 24-38 %A Andrew D. Birrell %A Bruce Jay Nelson %T Implementing remote procedure calls %J ACM Transactions on Computer Systems %K tocs %V 2 %N 1 %D February 1984 %P 39-59 %A Simon Y. Berkovich %A Colleen Roe Wilson %T A computer communication technique using content-induced transaction overlap %J ACM Transactions on Computer Systems %K tocs %V 2 %N 1 %D February 1984 %P 60-77 %A Hisao Kameda %T Optimality of a central processor scheduling policy for processing a job stream %J ACM Transactions on Computer Systems %K tocs %V 2 %N 1 %D February 1984 %P 78-90 %A Marco Ajmone Marsan %A Gianni Conte %A Gianfranco Balbo %T A class of generalized stochastic Petri nets for the performance evaluation of multiprocessor systems %J ACM Transactions on Computer Systems %K tocs %V 2 %N 2 %D May 1984 %P 93-122 %A Asser N. Tantawi %A Manfred Ruschitzka %T Performance analysis of checkpointing strategies %J ACM Transactions on Computer Systems %K tocs %V 2 %N 2 %D May 1984 %P 123-144 %A Fred B. Schneider %T Byzantine generals in action: implementing fail-stop processors %J ACM Transactions on Computer Systems %K tocs %V 2 %N 2 %D May 1984 %P 145-154 %A James W. Stamos %T Static grouping of small objects to enhance performance of a paged virtual memory %J ACM Transactions on Computer Systems %K tocs %V 2 %N 2 %D May 1984 %P 155-180 %A Marshall K. McKusick %A William N. Joy %A Samuel J. Leffler %A Robert S. Fabry %T A fast file system for UNIX %J ACM Transactions on Computer Systems %K tocs %V 2 %N 3 %D August 1984 %P 181-197 %A Carl E. Landwehr %A Constance L. Heitmeyer %A John McLean %T A security model for military message systems %J ACM Transactions on Computer Systems %K tocs %V 2 %N 3 %D August 1984 %P 198-222 %A Peter M. Schwartz %A Alfred Z. Spector %T Synchronizing shared abstract types %J ACM Transactions on Computer Systems %K tocs %V 2 %N 3 %D August 1984 %P 223-250 %A Jo-Mei Chang %A N.F. Maxemchuk %T Reliable broadcast protocols %J ACM Transactions on Computer Systems %K tocs %V 2 %N 3 %D August 1984 %P 251-273 %A J.H. Saltzer %A D.P. Reed %A D.D. Clark %T End-to-end arguments in system design %J ACM Transactions on Computer Systems %K tocs %V 2 %N 4 %D November 1984 %P 277-288 %A James E. Smith %T Decoupled access/execute computer architectures %J ACM Transactions on Computer Systems %K tocs %V 2 %N 4 %D November 1984 %P 289-308 %A Walter F. Tichy %T The string-to-string correction problem with block moves %J ACM Transactions on Computer Systems %K tocs %V 2 %N 4 %D November 1984 %P 309-321 %A Raphael Rom %T Ordering subscribers on cable networks %J ACM Transactions on Computer Systems %K tocs %V 2 %N 4 %D November 1984 %P 322-334 %A Raymond Bryant %A Anthony Wasserman %A M. Seetha Lakshmi %A K. Mani Chandy %T The MVA priority approximation %J ACM Transactions on Computer Systems %K tocs %V 2 %N 4 %D November 1984 %P 335-359 %A Andrew D. Birrell %T Secure communication using remote procedure calls %J ACM Transactions on Computer Systems %K tocs %V 3 %N 1 %D February 1985 %P 1-14 %A Dale Skeen %T Determining the last process to fail %J ACM Transactions on Computer Systems %K tocs %V 3 %N 1 %D February 1985 %P 15-30 %A Douglas W. Clark %A Joel S. Emer %T Performance of the VAX-11/780 translation buffer: simulation and measurement %J ACM Transactions on Computer Systems %K tocs %V 3 %N 1 %D February 1985 %P 31-62 %A K. Many Chandy %A Leslie Lamport %T Distributed snapshots: determining global states of distributed systems %J ACM Transactions on Computer Systems %K tocs %V 3 %N 1 %D February 1985 %P 63-75 %A David R. Cheriton %A Willy Zwaenepoel %T Distributed process groups in the V kernel %J ACM Transactions on Computer Systems %K tocs %V 3 %N 2 %D May 1985 %P 77-107 %A S. Even %A O. Goldreich %T On the power of cascade ciphers %J ACM Transactions on Computer Systems %K tocs %V 3 %N 2 %D May 1985 %P 108-116 %A Krishnan Padmanabhan %A Duncan H. Lawrie %T Performance analysis of redundant-path networks for multiprocessor systems %J ACM Transactions on Computer Systems %K tocs %V 3 %N 2 %D May 1985 %P 117-144 %A Mamoru Maekawa %T A root(N) algorithm for mutual exlusion in decentralized systems %J ACM Transactions on Computer Systems %K tocs %V 3 %N 2 %D May 1985 %P 145-159 %A Alan Jay Smith %T Disk cache - miss ratio analysis and design considerations %J ACM Transactions on Computer Systems %K tocs %V 3 %N 3 %D August 1985 %P 161-203 %A Robert E. Strom %A Shaula Yemini %T Optimistic recovery in distributed systems %J ACM Transactions on Computer Systems %K tocs %V 3 %N 3 %D August 1985 %P 204-226 %A Y.C. Tay %A Rajan Suri %T Error bounds for performance prediction in queueing networks %J ACM Transactions on Computer Systems %K tocs %V 3 %N 3 %D August 1985 %P 227-254 %A Mark R. Brown %A Karen N. Kolling %A Edward A. Taft %T The Alpine file system %J ACM Transactions on Computer Systems %K tocs %V 3 %N 4 %D November 1985 %P 261-293 %A Renato de\ Mori %A Regis Cardin %T A recursive algorithm for binary multiplication and its implementation %J ACM Transactions on Computer Systems %K tocs %V 3 %N 4 %D November 1985 %P 294-314 %A Ching-Hua Chow %A Mohamed G. Gouda %A Simon S. Lam %T A discipline for constructing multiphase communication protocols %J ACM Transactions on Computer Systems %K tocs %V 3 %N 4 %D November 1985 %P 315-343 %A Ichiro Suzuki %A Tadao Kasami %T A distributed mutual exclusion algorithm %J ACM Transactions on Computer Systems %K tocs %V 3 %N 4 %D November 1985 %P 344-349 %A Connie U. Smith %T Independent general principles for constructing responsive software systems %J ACM Transactions on Computer Systems %K tocs %V 4 %N 1 %D February 1986 %P 1-31 %A Maurice Herlihy %T A quorum-consensus replication method for abstract data types %J ACM Transactions on Computer Systems %K tocs %V 4 %N 1 %D February 1986 %P 32-53 %A Thomas A. Joseph %A Kenneth P. Birman %T Low cost management of replicated data in fault-tolerant distributed systems %J ACM Transactions on Computer Systems %K tocs %V 4 %N 1 %D February 1986 %P 54-70 %A Hisao Kameda %T Effects of job loading policies for multiprogramming systems in processing a job stream %J ACM Transactions on Computer Systems %K tocs %V 4 %N 1 %D February 1986 %P 71-106 %A Nicholas Carriero %T The S/Net's Linda kernel %J ACM Transactions on Computer Systems %K tocs %V 4 %D 1986 %P 110 %A Nancy P. Kronenberg %T VAXclusters: a closely coupled distributed system %J ACM Transactions on Computer Systems %K tocs %V 4 %D 1986 %P 130 %A Robert Fitzgerald %T The integration of virtual memory management and interprocess communication in Accent %J ACM Transactions on Computer Systems %K tocs %V 4 %D 1986 %P 147 %A K.P. Hoyme %T A tree-structured mean value analysis algorithm %J ACM Transactions on Computer Systems %K tocs %V 4 %D 1986 %P 178 %A Daniel Barbara %T The vulnerability of vote assignments %J ACM Transactions on Computer Systems %K tocs %V 4 %D 1986 %P 187 %A R.K. Iyer %T Measurement and modeling of computer reliability %J ACM Transactions on Computer Systems %K tocs %V 4 %D 1986 %P 214 %A Edward D. Lazowska %T File access performance of diskless workstations %J ACM Transactions on Computer Systems %K tocs %V 4 %D 1986 %P 238 %A James Archibald %A Jean-Loup Baer %T Cache coherence protocols: evaluation using a multiprocessor simulation model %J ACM Transactions on Computer Systems %K tocs %V 4 %N 4 %D November 1986 %P 273-298 %A Douglas E. Comer %A Larry L. Peterson %T Conversation-based mail %J ACM Transactions on Computer Systems %K tocs %V 4 %N 4 %D November 1986 %P 299-319 %A D.Z. Badal %T The distributed deadlock detection algorithm %J ACM Transactions on Computer Systems %K tocs %V 4 %N 4 %D November 1986 %P 320-337 %A Michael J. Carey %A Waleed A. Muhanna %T The performance of multiversion concurrency control algorithms %J ACM Transactions on Computer Systems %K tocs %V 4 %N 4 %D November 1986 %P 338-378 %A Leslie Lamport %T A fast mutual exclusion algorithm %J ACM Transactions on Computer Systems %K tocs %V 5 %N 1 %D February 1987 %P 1-11 %A David R. Cheriton %T UIO: a uniform I/O interface for distributed systems %J ACM Transactions on Computer Systems %K tocs %V 5 %N 1 %D February 1987 %P 12-46 %A Kenneth P. Birman %A Thomas A. Joseph %T Reliable communication in the presence of failures %J ACM Transactions on Computer Systems %K tocs %V 5 %N 1 %D February 1987 %P 47-76 %A Robert Geist %A Stephen Daniel %T A continuum of disk scheduling algorithms %J ACM Transactions on Computer Systems %K tocs %V 5 %N 1 %D February 1987 %P 77-92 %A Alan Jay Smith %T Remark in "Disk cache - miss ratio analysis and design considerations" %J ACM Transactions on Computer Systems %K tocs %V 5 %N 1 %D February 1987 %P 93 %A Richard W. Watson %A Sandy A. Mamrak %T Gaining efficiency in transport services by appropriate design and implementation choices %J ACM Transactions on Computer Systems %K tocs %V 5 %N 2 %D May 1987 %P 97-120 %A Jeffrey Joyce %A Greg Lomow %A Konrad Slind %A Brian Unger %T Monitoring distributed systems %J ACM Transactions on Computer Systems %K tocs %V 5 %N 2 %D May 1987 %P 121-150 %A Janice I. Glasgow %A Glenn H. MacEwen %T The development and proof of a formal specification for a multilevel secure system %J ACM Transactions on Computer Systems %K tocs %V 5 %N 2 %D May 1987 %P 151-184 %A Karsten Schwan %A Tom Bihari %A Bruce W. Weide %A George Taulbee %T High-performance operating system primitives for robotics and real-time control systems %J ACM Transactions on Computer Systems %K tocs %V 5 %N 3 %D August 1987 %P 189-231 %A Paul K. Harter,\ Jr. %T Response times in level-structured systems %J ACM Transactions on Computer Systems %K tocs %V 5 %N 3 %D August 1987 %P 232-248 %A Maurice Herlihy %T Concurrency versus availability: atomicity mechanisms for replicated data %J ACM Transactions on Computer Systems %K tocs %V 5 %N 3 %D August 1987 %P 249-274 %A W. Worth Kirkman %T An optimized contention protocol for broadband networks %J ACM Transactions on Computer Systems %K tocs %V 5 %N 3 %D August 1987 %P 275-283 %A Beverly A. Sanders %T The information structure of distributed mutual exclusion algorithms %J ACM Transactions on Computer Systems %K tocs %V 5 %N 3 %D August 1987 %P 284-299